Sciweavers

1054 search results - page 16 / 211
» Secret Communication with Feedback
Sort
View
AIED
2009
Springer
15 years 4 months ago
Feedback Specificity and the Learning of Intercultural Communication Skills
The role of explicit feedback in learning has been studied from a variety of perspectives and in many contexts. In this paper, we examine the impact of the specificity of feedback ...
Matthew Hays, H. Chad Lane, Daniel Auerbach, Mark ...
ICC
2007
IEEE
186views Communications» more  ICC 2007»
15 years 4 months ago
An Efficient Cluster-Based Proactive Secret Share Update Scheme for Mobile Ad Hoc Networks
– When implementing public key security ser- easy for an adversary to collect data and attack. To solve this vices in mobile ad hoc networks (MANETs), multiple problem, the distr...
Ying Dong, Ai Fen Sui, Siu-Ming Yiu, Victor O. K. ...
CRYPTO
2009
Springer
145views Cryptology» more  CRYPTO 2009»
15 years 4 months ago
Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
We study the design of cryptographic primitives resilient to key-leakage attacks, where an attacker can repeatedly and adaptively learn information about the secret key, subject o...
Joël Alwen, Yevgeniy Dodis, Daniel Wichs
SASN
2006
ACM
15 years 3 months ago
Diversify sensor nodes to improve resilience against node compromise
A great challenge in securing sensor networks is that sensor nodes can be physically compromised. Once a node is compromised, attackers can retrieve secret information (e.g. keys)...
Abdulrahman Alarifi, Wenliang Du
HAID
2009
Springer
14 years 7 months ago
Communicative Functions of Haptic Feedback
In this paper a number of examples are presented of how haptic and auditory feedback can be used for deictic referencing in collaborative virtual environments. Haptic feedback supp...
Jonas Moll, Eva-Lotta Sallnäs